咨询与建议

限定检索结果

文献类型

  • 2,152 篇 会议
  • 1,625 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 3,798 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,287 篇 工学
    • 1,170 篇 计算机科学与技术...
    • 950 篇 软件工程
    • 493 篇 信息与通信工程
    • 447 篇 电气工程
    • 409 篇 电子科学与技术(可...
    • 389 篇 控制科学与工程
    • 222 篇 光学工程
    • 212 篇 机械工程
    • 208 篇 生物工程
    • 186 篇 生物医学工程(可授...
    • 161 篇 动力工程及工程热...
    • 153 篇 仪器科学与技术
    • 105 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 89 篇 交通运输工程
    • 79 篇 土木工程
    • 54 篇 力学(可授工学、理...
  • 1,222 篇 理学
    • 606 篇 数学
    • 374 篇 物理学
    • 265 篇 生物学
    • 176 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 102 篇 化学
  • 466 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 126 篇 工商管理
  • 195 篇 医学
    • 164 篇 临床医学
    • 135 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
  • 75 篇 法学
    • 63 篇 社会学
  • 43 篇 经济学
  • 42 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 11 篇 艺术学
  • 8 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 153 篇 laboratories
  • 66 篇 feature extracti...
  • 65 篇 computer science
  • 65 篇 computational mo...
  • 59 篇 hardware
  • 57 篇 data mining
  • 54 篇 deep learning
  • 54 篇 optimization
  • 45 篇 delay
  • 45 篇 training
  • 44 篇 application soft...
  • 43 篇 equations
  • 42 篇 neural networks
  • 42 篇 frequency
  • 42 篇 control systems
  • 42 篇 algorithm design...
  • 42 篇 accuracy
  • 39 篇 computer archite...
  • 39 篇 image segmentati...
  • 39 篇 bandwidth

机构

  • 43 篇 national enginee...
  • 41 篇 college of compu...
  • 40 篇 department of co...
  • 39 篇 key laboratory o...
  • 37 篇 department of el...
  • 30 篇 department of el...
  • 28 篇 university of ch...
  • 28 篇 state key labora...
  • 27 篇 national mobile ...
  • 22 篇 department of el...
  • 21 篇 distributed mult...
  • 21 篇 department of co...
  • 20 篇 peng cheng labor...
  • 19 篇 department of co...
  • 19 篇 state key labora...
  • 18 篇 department of au...
  • 18 篇 frontiers scienc...
  • 17 篇 distributed mult...
  • 17 篇 ieee
  • 17 篇 state key labora...

作者

  • 33 篇 mei-ling shyu
  • 33 篇 shu-ching chen
  • 28 篇 zongli lin
  • 27 篇 zhou mengchu
  • 25 篇 chen shu-ching
  • 25 篇 yang yang
  • 24 篇 jian song
  • 21 篇 hamid soltanian-...
  • 20 篇 mengchu zhou
  • 20 篇 shyu mei-ling
  • 19 篇 wang xingjun
  • 18 篇 chen mingzhe
  • 16 篇 han zhu
  • 16 篇 bowers john e.
  • 16 篇 k. feher
  • 15 篇 song jian
  • 15 篇 arce gonzalo r.
  • 14 篇 shuzhi sam ge
  • 14 篇 chang lin
  • 14 篇 shu haowen

语言

  • 3,578 篇 英文
  • 139 篇 其他
  • 78 篇 中文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Digital System Engineering Laboratory Department of Computer Engineering"
3798 条 记 录,以下是421-430 订阅
排序:
A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical Clustering∗  6
A Method for Discovering Hidden Patterns of Cybersecurity Kn...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Ding, Zhaoyun Cao, Deqi Liu, Lina Yu, Donghua Ma, Haoyang Wang, Fei National University Of Defense Technology Key Laboratory Of Information System Engineering Changsha China School Of Electronic And Information Engineering Soochow University Suzhou China Shaoxing University Department Of Computer Science And Engineering Shaoxing China
The construction of cybersecurity knowledge graphs improves the full-dimensional cognitive ability of cyber threats. However, most of the current research on the cybersecurity knowledge graphs focuses on the one-hop o... 详细信息
来源: 评论
A Bi-objective Optimal Scheme for 5G Base Station Deployment Based on BPSO  12th
A Bi-objective Optimal Scheme for 5G Base Station Deployment...
收藏 引用
12th International Conference on computer engineering and Networks, CENet 2022
作者: Zhu, Tao Xu, Yin-qing Guo, Hao-qi Wang, Yi-bo Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Province Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing210031 China
The 5G mobile network is a kind of critical information infrastructure for future Internet of Things. Due to its rapid development, the planning and deployment of 5G network base stations is a more urgent and meaningf... 详细信息
来源: 评论
Knowledge system,Ontology,and Knowledge Graph of the Deep-Time digital Earth(DDE): Progress and Perspective
收藏 引用
Journal of Earth Science 2023年 第5期34卷 1323-1327页
作者: Xiumian Hu Yiwei Xu Xiaogang Ma Yunqiang Zhu Chao Ma Chao Li Hairong Lü Xinbing Wang Chenghu Zhou Chengshan Wang School of Earth Sciences and Engineering Nanjing UniversityNanjing 210023China State Key Laboratory of Palaeobiology and Stratigraphy Nanjing Institute of Geology and Palaeontology and Center for Excellence in Life and PaleoenvironmentChinese Academy of SciencesNanjing 210008China Department of Computer Science University of IdahoMoscow ID 83844USA Institute of Geographical Science and Natural Resources Chinese Academy of SciencesBeijing 100101China State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation&Institute of Sedimentary Geology&College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China IUGS Deep-Time Digital Earth Research Center of Excellence Suzhou 215101China Department of Automation Tsinghua UniversityBeijing 100084China School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Biogeology and Environmental Geology China University of GeosciencesBeijing 100083China
THE USE OF KNOWLEDGE GRAPH IN NATURAL SCIENCE Knowledge graph is a field of Artificial Intelligence(AI)that aims to represent knowledge in the form of graphs,consisting of nodes and edges which represent entities and ... 详细信息
来源: 评论
Automating smart Internet of Things devices in modern homes using context-based fuzzy logic
收藏 引用
Computational Intelligence 2024年 第1期40卷 e12370-e12370页
作者: Ming, Chen Kadry, Seifedine Dasel, A. Antony Hubei Key Laboratory of Power System Design and Test for Electrical Vehicle Hubei University of Arts and Science Xiangyang China School of Automotive and Traffic Engineering Hubei University of Arts and Science Xiangyang China Department of Mathematics and Computer Science Beirut Arab University Beirut Lebanon Department of Mechanical Engineering VIT University Vellore India
Internet of Things (IoT) is mainly used to connect different embedded objects over the internet to make communication between them possible. With the help of IoT, devices find a way to interact, work together, and stu... 详细信息
来源: 评论
Implementing digital Twins for Enhanced Energy Management in Three Case Studies
Implementing Digital Twins for Enhanced Energy Management in...
收藏 引用
Metrology for Living Environment (MetroLivEn), IEEE International Workshop on
作者: Tancredi Testasecca Stathis Stamatopoulos Andrea Natalini Marilena Lazzaro Chiara Maria Capizzi Elissaios Sarmas Diego Arnone Dipartimento di Ingegneria Università degli Studi di Palermo Palermo Italy Decision Support Systems Laboratory School of Electrical & Computer Engineering National Technical University of Athens Athens Greece Digital Twin and IOT Solutions Department Engineering Ingegneria Informatica S.p.A. Rome Italy Digital Hubs Engineering Ingegneria Informatica S.p.A. Palermo Italy
digitalization is recognized as a powerful enabler for decarbonizing the building sector. The International Energy Agency has highlighted its potential to improve safety, productivity, accessibility, and sustainabilit... 详细信息
来源: 评论
Video2Reward: Generating Reward Function from Videos for Legged Robot Behavior Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Runhao Zhou, Dingjie Liang, Qiwei Liu, Junlin Li, Hui Huang, Changxin Li, Jianqiang Hu, Xiping Sun, Fuchun Artificial Intelligence Research Institute Shenzhen MSU-BIT University China College of Mechatronics and Control Engineering Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science and Technology Tsinghua University China
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func... 详细信息
来源: 评论
A Surveillance system Utilizing mmWave-FMCW Radar for Restricted Control Area
A Surveillance System Utilizing mmWave-FMCW Radar for Restri...
收藏 引用
International Conference on Electrical engineering/Electronics, computer, Telecommunications and Information Technology, ECTI-CON
作者: Nattakarn Shutimarrungson Seksan Eiadkaew Akkarat Boonpoonga Krit Athikulwongse Suramate Chalermwisutkul Department of Business Computer Mahasarakham Business School Mahasarakham University Maha Sarakham Thailand Department of Electrical and Computer Engineering Faculty of Engineering King Mongkut's University of Technology North Bangkok Bangkok Thailand Department of Electrical and Computer Engineering Faculty of Engineering Research Center of Innovation Digital and Electromagnetic Technology (iDEMT) King Mongkut's University of Technology North Bangkok Bangkok Thailand National Electronics and Computer Technology Center National Science and Technology Development Agency Pathumthani Thailand Communication and Smart System Engineering The Sirindhorn International Thai- German Graduate School of Engineering King Mongkut's University of Technology North Bangkok Bangkok Thailand
In this paper, we introduce a surveillance system utilizing mmWave-FMCW radar designed for restricted control areas. The experiment, conducted in our laboratory, defines the restricted control area parameters. Employi... 详细信息
来源: 评论
The Side-Channel Vulnerability in Network Protocol  11
The Side-Channel Vulnerability in Network Protocol
收藏 引用
11th International Conference on Communication and Network Security, ICCNS 2021
作者: Ru, Kaiqi Zheng, Yaning Feng, Xuewei Wang, Dongxia National Key Laboratory of Science and Technology on Information System Security Institute of System Engineering AMS PLA China Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Some recent studies have found that there are some side-channel vulnerabilities in the operating system. Attackers would exploit the side-channel vulnerability for malicious purpose, such as hijack connections, denial... 详细信息
来源: 评论
Deep Convolutional Neural Network Approach for COVID-19 Detection
收藏 引用
computer systems Science & engineering 2022年 第7期42卷 201-211页
作者: Yu Xue Bernard-Marie Onzo Romany F.Mansour Shoubao Su School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjingChina Department of Mathematics Faculty of ScienceNew Valley UniversityEl-Kharja72511Egypt Jiangsu Key Laboratory of Data Science and Smart Software Jinling Institute of TechnologyNanjing211169China
Coronavirus disease 2019(Covid-19)is a life-threatening infectious disease caused by a newly discovered strain of the *** by the end of 2020,Covid-19 is still not fully understood,but like other similar viruses,the ma... 详细信息
来源: 评论
Last-X-Generation Archiving Strategy for Multi-Objective Evolutionary Algorithms
Last-X-Generation Archiving Strategy for Multi-Objective Evo...
收藏 引用
Congress on Evolutionary Computation
作者: Tianye Shu Yang Nan Ke Shang Hisao Ishibuchi Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China Southern University of Science and Technology Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
For evolutionary multi-objective optimization algorithms (EMOAs), an external archive can be utilized for saving good solutions found throughout the evolutionary process. Recent studies showed that a solution set sele... 详细信息
来源: 评论